<?xml version="1.0" encoding="utf-8"?>
<rss version="2.0"
    xmlns:content="http://purl.org/rss/1.0/modules/content/"
    xmlns:dc="http://purl.org/dc/elements/1.1/"
    xmlns:atom="http://www.w3.org/2005/Atom">
    <channel>
        <title>Firebox - Certificates — WatchGuard Community</title>
        <link>https://community.watchguard.com/watchguard-community/</link>
        <pubDate>Mon, 13 Apr 2026 23:45:22 +0000</pubDate>
        <language>en</language>
            <description>Firebox - Certificates — WatchGuard Community</description>
    <atom:link href="https://community.watchguard.com/watchguard-community/categories/firebox-certificates/feed.rss" rel="self" type="application/rss+xml"/>
    <item>
        <title>KCSiE TLS decryption</title>
        <link>https://community.watchguard.com/watchguard-community/discussion/4503/kcsie-tls-decryption</link>
        <pubDate>Thu, 22 Jan 2026 11:22:57 +0000</pubDate>
        <category>Firebox - Certificates</category>
        <dc:creator>CRU_Technologies_Ltd</dc:creator>
        <guid isPermaLink="false">4503@/watchguard-community/discussions</guid>
        <description><![CDATA[<p>We have numerous WG's installed for our customers, but we will be implementing SafeGuarding for a new install.<br />
The majority of the devices will be BYOD.<br />
I (am coming to appreciate that) will need to install a certificate on each device for the TLS decryption to take place.<br />
So curious to know how any of you guys have implemented this for the easiest BYOD end user experience?<br />
Simon.</p>
]]>
        </description>
    </item>
    <item>
        <title>Best Way to Prepare for WatchGuard Firebox Certification? Need Advice</title>
        <link>https://community.watchguard.com/watchguard-community/discussion/4534/best-way-to-prepare-for-watchguard-firebox-certification-need-advice</link>
        <pubDate>Wed, 18 Feb 2026 10:06:55 +0000</pubDate>
        <category>Firebox - Certificates</category>
        <dc:creator>Adam754</dc:creator>
        <guid isPermaLink="false">4534@/watchguard-community/discussions</guid>
        <description><![CDATA[<p>Hi everyone,</p>

<p>I’m currently preparing for the WatchGuard Firebox certification and wanted to ask for some advice from those who have already passed.</p>

<p>What study resources did you find most helpful? Did you focus more on hands-on practice with Firebox configuration, policies, VPN setup, and certificates, or mostly on theory?</p>

<p>I’ve been practicing labs and reviewing different study materials. I also checked some practice questions from Passexam4sure to test my understanding and identify weak areas.</p>

<p>Any tips on important topics, common mistakes, or exam pattern insights would be really appreciated.</p>

<p>Thanks in advance 🙂</p>
]]>
        </description>
    </item>
    <item>
        <title>Disable TLS 1.1 and weak ciphers for TLS 1.2</title>
        <link>https://community.watchguard.com/watchguard-community/discussion/746/disable-tls-1-1-and-weak-ciphers-for-tls-1-2</link>
        <pubDate>Fri, 31 Jan 2020 00:06:44 +0000</pubDate>
        <category>Firebox - Certificates</category>
        <dc:creator>bmax1985</dc:creator>
        <guid isPermaLink="false">746@/watchguard-community/discussions</guid>
        <description><![CDATA[<p>Sorry for the long post...</p>

<p>Long story short, I have an group scanning the external side of my firebox for security auditing from our corporate organization.  This post is in regard to the default webserver page enabled with the SSL VPN.</p>

<p>I'm getting negative marks for:<br />
"This server supports TLS 1.1."</p>

<p>And for using these ciphers:<br />
TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384 (0xc028) ECDH secp384r1 (eq. 7680 bits RSA) FS <br />
TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA (0xc014) ECDH secp384r1 (eq. 7680 bits RSA) FS <br />
TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 (0xc027) ECDH secp384r1 (eq. 7680 bits RSA) FS<br />
TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA (0xc013) ECDH secp384r1 (eq. 7680 bits RSA) FS <br />
TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 (0x6b) DH 2048 bits FS<br />
TLS_DHE_RSA_WITH_AES_256_CBC_SHA (0x39) DH 2048 bits FS<br />
TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 (0x67) DH 2048 bits FS<br />
TLS_DHE_RSA_WITH_AES_128_CBC_SHA (0x33) DH 2048 bits FS</p>

<p>I do have an active support case regarding this but desire to learn more about how this works.</p>

<p>I'm told by Watchguard:  TLS functionality and ciphers used seem to be set via the CA<br />
I'm told by the person who issues our certificates:  This functionality should be modified at the web server</p>

<p>How <em>should</em> this be resolved.  I do not know how certificates work as I've only recently been brought into a role where that knowledge is relevant.  I'm also finding that the whole IT Security topic is so vast that I may never comprehend everything.</p>

<p>The cert is valid and was generated by digicert with a CSR from OpenSSL as recomended by watchguard with commands specific to our organization (Per the person who generated the certificate).</p>

<p>Posting this now and hope to revisit sometime tomorrow or over the weekend but will be traveling.  I'd love nothing more than to have some truly educational responses when I get back to it though.</p>
]]>
        </description>
    </item>
    <item>
        <title>Mobile VPN with SSL certificates expired</title>
        <link>https://community.watchguard.com/watchguard-community/discussion/4293/mobile-vpn-with-ssl-certificates-expired</link>
        <pubDate>Mon, 05 May 2025 16:36:02 +0000</pubDate>
        <category>Firebox - Certificates</category>
        <dc:creator>crm_informatica</dc:creator>
        <guid isPermaLink="false">4293@/watchguard-community/discussions</guid>
        <description><![CDATA[<p>Hello to everybody,<br />
          I have an old XTM330 but it has the SSL certificates that are expired. The Mobile VPN with SSL is not working fine of course for this reason. What have I to do? Is there available a self-signed generation of the certificates? I don't know this firewall and I don't find any guide to solve this kind of problem. Thanks in advance.<br />
Michele</p>
]]>
        </description>
    </item>
    <item>
        <title>SSLVPN client 12.10 vs12.11 &amp; CA cert</title>
        <link>https://community.watchguard.com/watchguard-community/discussion/4241/sslvpn-client-12-10-vs12-11-ca-cert</link>
        <pubDate>Thu, 20 Mar 2025 15:45:37 +0000</pubDate>
        <category>Firebox - Certificates</category>
        <dc:creator>RobClarke</dc:creator>
        <guid isPermaLink="false">4241@/watchguard-community/discussions</guid>
        <description><![CDATA[<p>Hi, I upgraded the firebox to firmware version 12.11 from 12.10, a couple of weeks ago.<br />
All endpoints are running the 12.10 VPN client.</p>

<p>On my test machine to trial the 12.11 client (including SMAL auth, which works great), I get a certificate mismatch warning on the first run. If I install the certificate but cancel the connection. On the next run I get a different warning that the certificate name does not match the name of the site.</p>

<p>I don't recall having to have made any changes with the firebox certs previously so I'm a little unsure of the next steps.<br />
This official WG video runs through the steps to add a cert with a valid SAN names. <a rel="nofollow" href="https://www.youtube.com/watch?v=tDoC9_O2mUw">https://youtube.com/watch?v=tDoC9_O2mUw</a></p>

<ol><li>If I do this will this disconnect existing VPN sessions?</li>
<li>If I do this will it affect the VPN clients still running 12.10?</li>
</ol><p>I'm happy enough to distribute the updated certificate when I roll out the upgrade to 12.11. I'll package it up into an intunewin and deploy via InTune. I already include an OpenVPN &amp; a Watchguard cert this way.</p>

<p>I'm just a bit worried if modifying the CA cert will affect anyone using the older VPN client.</p>

<p>Additionally we have a couple of users using the IKEv2 method, will this be affected if the cert if updated?</p>
]]>
        </description>
    </item>
    <item>
        <title>CLI Import Certificate name ignored - default cert overwritten</title>
        <link>https://community.watchguard.com/watchguard-community/discussion/4235/cli-import-certificate-name-ignored-default-cert-overwritten</link>
        <pubDate>Thu, 20 Mar 2025 07:20:50 +0000</pubDate>
        <category>Firebox - Certificates</category>
        <dc:creator>MaikFx</dc:creator>
        <guid isPermaLink="false">4235@/watchguard-community/discussions</guid>
        <description><![CDATA[<p>Hi, proxy certificate generated on other server - LE. PEM -&gt; PFX conversation with openssl</p>

<p>Windows PowerShell with POSH-SSH module for login and grabbing session stream. I am using following command</p>

<p><strong>import certificate proxy-server from <a href="ftp://@172.30.1.174/ex2016_owa.pfx" rel="nofollow">ftp://@172.30.1.174/ex2016_owa.pfx</a> SuperPassWord</strong></p>

<p>Auto-Fill password and name. After import ist complete the Default certificate ist overwritten. I am currently not able to add additional proxy certs via cli.</p>

<p>Other attempt with web-gui generated a generic name: (server-1) I tried to re-import via gui and new display name is "test-mf". I used cli to list certificates. "test-mf" was not found, but server-1. Seems like the original cert name was kept.</p>

<p>For automisation we want to use CLI. Currently default cert replacement works, because we use a wildcard cert.</p>

<p>Why is the name ignored when we use cli command to import? Bug? Hidden parameters available?</p>

<p>In general import via cli works fine. But we can't really control cert name, neither overwrite of existing default certificate.</p>

<p>Furthermor, display name != name</p>

<p>It is possible to import certs automatically without usning web-gui/ api. Just with a simple CLI command, that uses all needed parameter: Name, Display Name, Overwrite....</p>

<p>Currently cert-data, password and purpose seems to be accepted.</p>

<p>greetz Maik</p>
]]>
        </description>
    </item>
    <item>
        <title>Revoked certificate</title>
        <link>https://community.watchguard.com/watchguard-community/discussion/4170/revoked-certificate</link>
        <pubDate>Mon, 03 Feb 2025 01:02:59 +0000</pubDate>
        <category>Firebox - Certificates</category>
        <dc:creator>JK7546</dc:creator>
        <guid isPermaLink="false">4170@/watchguard-community/discussions</guid>
        <description><![CDATA[<p>Hi all</p>

<p>I've currently got a certificate issue on the WG that I'd like some advice on. We have a M390 with an SSLVPN portal set up where users can go and login and download the VPN client.</p>

<p>A few weeks ago it appears something happened to the certificate and now the site is coming up with 403 Forbidden when accessed.<br />
The current wildcard certificate that we use for our other sites is valid and expires in August 2025. I tried to import the current cert again using WSM and WebUI but it is coming up as Revoked. I thought it may have been an old expired cert or a copy that was revoked (which doesn't make sense since all our other sites are still working fine) but nonetheless duplicated the current wildcard cert from our 3rd party cert provider portal and tried importing yet still came up as revoked.</p>

<p>I downloaded the CRL and the serial number for our cert is on the list and the date of revocation is August 2024 which was also puzzling, since the site definitely hasn't been down for that long.</p>

<p>I haven't tried generating a fresh CSR and going through that process yet, I thought importing a valid duplicate of the wildcard would be enough but apparently not.</p>

<p>If anyone could provide some suggestions on how to proceed from here, that would be great. Our current wildcard is definitely valid, but I can't explain how it is on the CRL. I have a fairly basic knowledge of certificates so currently stuck on how to proceed from here.</p>

<p>Next step - CSR request from the WSM/WebUI maybe?</p>

<p>Thank you</p>
]]>
        </description>
    </item>
    <item>
        <title>Web browsing certificate - TLS deciphering</title>
        <link>https://community.watchguard.com/watchguard-community/discussion/4162/web-browsing-certificate-tls-deciphering</link>
        <pubDate>Mon, 27 Jan 2025 18:16:37 +0000</pubDate>
        <category>Firebox - Certificates</category>
        <dc:creator>~Jon S</dc:creator>
        <guid isPermaLink="false">4162@/watchguard-community/discussions</guid>
        <description><![CDATA[<p>This isnt really a Watchguard issue specifically, but I am wondering if anyone else has seen this.</p>

<p>We installed a new T45.  We have TSS and HTTPS TLS deciphering turned on.  Its in a small office with no domain.  We have one machine, a current Win11 Home Surface, that will not use the certificate.   We import it and we get a message that it was successfully imported.  But the browser still prompts and checking the certificate manager, it doesnt show up at all.   The other machines in the office import and are working fine.   For now, I had to turn off the feature because of this one user.</p>

<p>I'm hoping someone has seen this and has an idea.  TIA!</p>
]]>
        </description>
    </item>
    <item>
        <title>VPN with SSL not connecting</title>
        <link>https://community.watchguard.com/watchguard-community/discussion/4012/vpn-with-ssl-not-connecting</link>
        <pubDate>Thu, 10 Oct 2024 19:46:41 +0000</pubDate>
        <category>Firebox - Certificates</category>
        <dc:creator>MValeCruz</dc:creator>
        <guid isPermaLink="false">4012@/watchguard-community/discussions</guid>
        <description><![CDATA[<p>From VPN SSL version 12.10.4  login logs</p>

<p>2024-09-27T10:36:23.588 OVPN:&gt;LOG:1727447783,N,VERIFY ERROR: depth=0, error=unable to get local issuer certificate: O=WatchGuard_Technologies, OU=Fireware, CN=Fireware SSLVPN Server, serial=1711096694</p>

<p>2024-09-27T10:36:23.588 OVPN:&gt;LOG:1727447783,N,OpenSSL: error:1416F086:SSL routines:tls_process_server_certificate:certificate verify failed</p>

<p>This is Windows 11 box and all Windows 10 machine don't have issues connecting.<br />
I have tried removing all Watchguard and Fireware certicates and<br />
loading from <a href="https://http://:4126/certportal" rel="nofollow">http://:4126/certportal</a></p>

<p>certificate loads fine and says status is OK, no error viewing the certificate.<br />
It is loaded into Trusted Root Certificate Authorities</p>

<p>but after it loaded and connection keep failing.</p>

<p>recently migrated from M270 box to M-T85, this is Win 11 stop connecting to new cert of the M-T85</p>

<p>Any suggestions?</p>
]]>
        </description>
    </item>
    <item>
        <title>FB webserver cert - Why is the imported certificate not shown in the 3rd party certificates list?</title>
        <link>https://community.watchguard.com/watchguard-community/discussion/1540/fb-webserver-cert-why-is-the-imported-certificate-not-shown-in-the-3rd-party-certificates-list</link>
        <pubDate>Mon, 11 Jan 2021 16:21:06 +0000</pubDate>
        <category>Firebox - Certificates</category>
        <dc:creator>SameAsBefore</dc:creator>
        <guid isPermaLink="false">1540@/watchguard-community/discussions</guid>
        <description><![CDATA[<p>Hello,</p>

<p>i'm not able to choose my imported wildcard certificate for the Firebox Web Server ( Access Portal). <br />
I've imported the .pfx file and three freshly imported certificates were shown in the certificate list ( System Manager). CA-CA2-mywildcard. The type of the CA certificates are recognized as 'CA Cert', my wildcard certificate is recognized as 'Web Server' ( also one of the default certificates ( cn=ike2muvpn Server) is listed as 'Web Server'. For other purposes i've another certificate imported on that firebox, cn=myExternalIP and type = 'IPSec / Web'. I'm able to select both of them as 3rd party certificate (Policy Manager), why isn't my wildcard certificate shown?</p>

<p>Firebox M570 Version 12.5.3<br />
System Manager v12.6.3<br />
Policy Manager v12.6.3</p>

<p>Thanks and stay healthy folks</p>
]]>
        </description>
    </item>
    <item>
        <title>Certificate Chain Incomplete - inbound proxy</title>
        <link>https://community.watchguard.com/watchguard-community/discussion/3988/certificate-chain-incomplete-inbound-proxy</link>
        <pubDate>Thu, 19 Sep 2024 16:45:41 +0000</pubDate>
        <category>Firebox - Certificates</category>
        <dc:creator>Woody</dc:creator>
        <guid isPermaLink="false">3988@/watchguard-community/discussions</guid>
        <description><![CDATA[<p>M370 v12.9.4</p>

<p>We uses a number of inbound proxies to manage traffic into webservers, and all has been good using a wildcard cert. for years, over upgrades and cert replacements.</p>

<p>Last weekend, the CA decided to revoke our certificate due to the way they validated the domain no longer being deemed secure.</p>

<p>I got a new cert issued, using IIS to create the CSR and then exported a PFX, as I have done numerous times before.  I imported along with the intermediate and all seemed to be OK.  That is until some apps that connect in to our servers began to fail, one specifically with a cert error.</p>

<p>Performing an SSL check (Qualys) showed that the cert chain is incomplete and the intermediate cert is not being presented by the Watchguard proxy.</p>

<p>I have tested using HTTP filters, and IIS passes the SSL test (ie presents the intermediate).  Similarly, my Netscaler is fine as you build the links manually.  The apps work again using a filter, so the chain issue must be causing the problem.</p>

<p>I have tried importing the inter and leaf certs in every way I can think of but with the same result.</p>

<p>I have never had this issue before, and intend to upgrade the version to latest (12.104 U2 at time of writing), but this has to be out of hours.</p>

<p>Does anyone have any experience or ideas?</p>

<p>Thanks!</p>
]]>
        </description>
    </item>
    <item>
        <title>SSL Web Page - Certificate</title>
        <link>https://community.watchguard.com/watchguard-community/discussion/3864/ssl-web-page-certificate</link>
        <pubDate>Mon, 24 Jun 2024 16:24:42 +0000</pubDate>
        <category>Firebox - Certificates</category>
        <dc:creator>RepartoIT</dc:creator>
        <guid isPermaLink="false">3864@/watchguard-community/discussions</guid>
        <description><![CDATA[<p>Hi to everybody,</p>

<p>I would like to fix the alert about the certificate of my SSL web page as you see in the screenshot:</p>

<p><img src="https://us.v-cdn.net/6029905/uploads/editor/56/jt7sa5rthrz2.png" alt="" title="" srcset="https://us.v-cdn.net/cdn-cgi/image/quality=80, format=auto, fit=scale-down, height=300, width=300/6029905/uploads/editor/56/jt7sa5rthrz2.png 300w, https://us.v-cdn.net/cdn-cgi/image/quality=80, format=auto, fit=scale-down, height=600, width=600/6029905/uploads/editor/56/jt7sa5rthrz2.png 600w, https://us.v-cdn.net/cdn-cgi/image/quality=80, format=auto, fit=scale-down, height=800, width=800/6029905/uploads/editor/56/jt7sa5rthrz2.png 800w, https://us.v-cdn.net/cdn-cgi/image/quality=80, format=auto, fit=scale-down, height=1200, width=1200/6029905/uploads/editor/56/jt7sa5rthrz2.png 1200w, https://us.v-cdn.net/cdn-cgi/image/quality=80, format=auto, fit=scale-down, height=1600, width=1600/6029905/uploads/editor/56/jt7sa5rthrz2.png 1600w, https://us.v-cdn.net/cdn-cgi/image/quality=80, format=auto, fit=scale-down, height=2000, width=2000/6029905/uploads/editor/56/jt7sa5rthrz2.png 2000w, https://us.v-cdn.net/6029905/uploads/editor/56/jt7sa5rthrz2.png" sizes="100vw" /></p>

<p>How should i proceed?</p>

<p>When i've uploaded my public certificate (pfx) in watchguard Web UI i can see many certificates, wich one i have to set as default one?</p>

<p>Right now i've got this as default:</p>

<p><img src="https://us.v-cdn.net/6029905/uploads/editor/m4/hvtunkqra8da.png" alt="" title="" srcset="https://us.v-cdn.net/cdn-cgi/image/quality=80, format=auto, fit=scale-down, height=300, width=300/6029905/uploads/editor/m4/hvtunkqra8da.png 300w, https://us.v-cdn.net/cdn-cgi/image/quality=80, format=auto, fit=scale-down, height=600, width=600/6029905/uploads/editor/m4/hvtunkqra8da.png 600w, https://us.v-cdn.net/cdn-cgi/image/quality=80, format=auto, fit=scale-down, height=800, width=800/6029905/uploads/editor/m4/hvtunkqra8da.png 800w, https://us.v-cdn.net/cdn-cgi/image/quality=80, format=auto, fit=scale-down, height=1200, width=1200/6029905/uploads/editor/m4/hvtunkqra8da.png 1200w, https://us.v-cdn.net/cdn-cgi/image/quality=80, format=auto, fit=scale-down, height=1600, width=1600/6029905/uploads/editor/m4/hvtunkqra8da.png 1600w, https://us.v-cdn.net/cdn-cgi/image/quality=80, format=auto, fit=scale-down, height=2000, width=2000/6029905/uploads/editor/m4/hvtunkqra8da.png 2000w, https://us.v-cdn.net/6029905/uploads/editor/m4/hvtunkqra8da.png" sizes="100vw" /></p>

<p>If I change certificate do we experience disruptions?</p>

<p>Thank you in advance.</p>
]]>
        </description>
    </item>
    <item>
        <title>Proxy Server Certificate Invalid</title>
        <link>https://community.watchguard.com/watchguard-community/discussion/3636/proxy-server-certificate-invalid</link>
        <pubDate>Fri, 19 Jan 2024 16:22:05 +0000</pubDate>
        <category>Firebox - Certificates</category>
        <dc:creator>shaazaminator</dc:creator>
        <guid isPermaLink="false">3636@/watchguard-community/discussions</guid>
        <description><![CDATA[<p>Hey Gang,</p>

<p>M470 12.9.4</p>

<p>I just finished updating my third party security certs used for the the access portal, web, and SSL VPN. After I choose the new cert in Policy Manager and save it to the Firebox I receive the following error, which I have never seen before every time I've done this.</p>

<p>"Proxy action - HTTPS-Server.3 is using and invalid Proxy Server certificate. Please select a valid certificate before saving the configuration to the box."</p>

<p>Looking at this particular proxy action I see no way to change the certificate it's using.</p>

<p>Never had this issue before updating the certs on any firebox before.</p>

<p>Thoughts?</p>

<p>Thanks!</p>

<ul><li>Doug</li>
</ul>]]>
        </description>
    </item>
    <item>
        <title>Certificates for mobile VPN</title>
        <link>https://community.watchguard.com/watchguard-community/discussion/3571/certificates-for-mobile-vpn</link>
        <pubDate>Tue, 12 Dec 2023 14:00:34 +0000</pubDate>
        <category>Firebox - Certificates</category>
        <dc:creator>DVM</dc:creator>
        <guid isPermaLink="false">3571@/watchguard-community/discussions</guid>
        <description><![CDATA[<p>Hi,<br />
I need to create certificates for some mobile VPN users. Can I use Watchguard CA Manager or should I go with other options, like OpenSSL or Easy-RSA? Are there any advantages or disadvantages of using CA Manager?  Any suggestions when creating the users certificates?</p>

<p>Thanks...</p>
]]>
        </description>
    </item>
    <item>
        <title>Server requested client certificate - not supported</title>
        <link>https://community.watchguard.com/watchguard-community/discussion/3451/server-requested-client-certificate-not-supported</link>
        <pubDate>Mon, 18 Sep 2023 10:23:16 +0000</pubDate>
        <category>Firebox - Certificates</category>
        <dc:creator>Robert_Vilhelmsen</dc:creator>
        <guid isPermaLink="false">3451@/watchguard-community/discussions</guid>
        <description><![CDATA[<p>Hi</p>

<p>When our secuirty software, Heimdal security, tries to access their proxy system, i am getting this error:</p>

<p>pxy <em>server requested client certificate</em> - not supported</p>

<p>The browser certificate warning, i am getting is on *.heimdalsecurity.com which works fine during normal browsing, but when the software does some kind of inspection on dns/tls connections, we sometimes get this error presented.</p>

<p>Testing heimdalsecurity.com with fairssl shows:<br />
rDNS (192.124.249.38):  cloudproxy10038.sucuri.net.</p>

<p>So i added cloudproxy10038.sucuri.net to a https filter and now it works as expected as the wg proxy is not involved. I guess the server software demands the heimdal client to present a certificate which is not a supported feature by wg proxy or?</p>

<p>Regards<br />
Robert</p>
]]>
        </description>
    </item>
    <item>
        <title>Intermediate certificates Removed From Windows 10</title>
        <link>https://community.watchguard.com/watchguard-community/discussion/3432/intermediate-certificates-removed-from-windows-10</link>
        <pubDate>Thu, 31 Aug 2023 14:50:15 +0000</pubDate>
        <category>Firebox - Certificates</category>
        <dc:creator>Kucster</dc:creator>
        <guid isPermaLink="false">3432@/watchguard-community/discussions</guid>
        <description><![CDATA[<p>I followed the directions and used GPO to add the intermediate cert to my Windows 10 clients. It worked for a week or so then one at a time everyone started telling me they were getting cert errors when surfing the internet. Come to find out the intermediate cert had been removed.<br />
Has anyone seen this, I can't seem to find any reason why this would have happened and I'm afraid to start again without knowing why.<br />
I'm running a pretty current network with Server 2022 and Win 10 Clients. We also use Bitdefender as our AV.<br />
Thanks for your help</p>
]]>
        </description>
    </item>
    <item>
        <title>certificate error on iPhone for outlook</title>
        <link>https://community.watchguard.com/watchguard-community/discussion/3373/certificate-error-on-iphone-for-outlook</link>
        <pubDate>Tue, 18 Jul 2023 13:46:58 +0000</pubDate>
        <category>Firebox - Certificates</category>
        <dc:creator>bford</dc:creator>
        <guid isPermaLink="false">3373@/watchguard-community/discussions</guid>
        <description><![CDATA[<p>Firebox M370<br />
Fireware 12.8.2</p>

<p>We're getting this message using our WiFi on our iPhones and trying to access Outlook.</p>

<p>Cannot Verify Server Identity<br />
The identity of "m.hotmail.com" cannot be verified</p>

<p>Details:</p>

<p>Certificate<br />
Outlook.com<br />
Issued by Fireware HTTPS (SN 80130...</p>

<p>Not Trusted<br />
Expires 4/26/24, 7:59:59 PM</p>

<p>We're using the correct passwords and MFA, how do we update a certificate on an iPhone?</p>
]]>
        </description>
    </item>
    <item>
        <title>Using 3rd party wildcard cert to pass PCI scans</title>
        <link>https://community.watchguard.com/watchguard-community/discussion/3278/using-3rd-party-wildcard-cert-to-pass-pci-scans</link>
        <pubDate>Wed, 24 May 2023 17:09:14 +0000</pubDate>
        <category>Firebox - Certificates</category>
        <dc:creator>Gakusei</dc:creator>
        <guid isPermaLink="false">3278@/watchguard-community/discussions</guid>
        <description><![CDATA[<p>Hello. Currently we have a client using a firecluster of M470s. They have a PCI scan of their external IP address that is coming back as failing due to self signing of the cert. I found the documentation that states to use a 3rd party signed cert and how to install said cert. No problem there, but I still have two questions.</p>

<ol><li>If we use a wildcard cert of *.domain.com, will the scan still come back as failing because its hitting the IP address not the domain?</li>
<li>Will this break anything? They do not use any VPN but I do believe there is a tunnel from their firewall to another vendor's firewall (they have offsite servers at a datacenter managed by another company).</li>
</ol><p>Thank you in advance.</p>
]]>
        </description>
    </item>
    <item>
        <title>Expired certificate - Hongkong Post Root CA</title>
        <link>https://community.watchguard.com/watchguard-community/discussion/3266/expired-certificate-hongkong-post-root-ca</link>
        <pubDate>Sat, 20 May 2023 09:19:50 +0000</pubDate>
        <category>Firebox - Certificates</category>
        <dc:creator>dl123456</dc:creator>
        <guid isPermaLink="false">3266@/watchguard-community/discussions</guid>
        <description><![CDATA[<p>Anyone else seeing this in the logs?</p>

<p>certd Certificate (subject=c=HK,o=Hongkong Post,cn=Hongkong Post Root CA 1) is expired. msg_id="4001-0004"</p>

<p>Looking at the certs I see;</p>

<p>Certificate Details<br />
Subject name    c=HK o=Hongkong Post cn=Hongkong Post Root CA 1<br />
Subject alt name<br />
Imported/Created    Tue May 09 2023 16:06:11 GMT+0100 (British Summer Time)<br />
Issuer  c=HK o=Hongkong Post cn=Hongkong Post Root CA 1<br />
Valid from  May 15 05:13:00 2003 GMT<br />
Valid to    May 15 04:52:00 2023 GMT<br />
Algorithm   RSA<br />
Key length  2048<br />
Key usage   Signature<br />
Extended key usage  CA Cert<br />
Fingerprint D6:DA:A8:20:8D:09:D2:15:4D:24:B5:2F:CB:34:6E:B2:58:B2:8A:58</p>

<p>So the message is accurate - cert has expired.</p>

<p>I have "Update Trusted CA for Proxies" on automatic and have pressed the button to<br />
"Download the latest versions of the Trusted CA certificates ".</p>

<p>Anyone know where the certs are being pulled from?    A Watchguard managed source?</p>

<p>T55 running     12.9.3.B679093.</p>
]]>
        </description>
    </item>
    <item>
        <title>Nessus Scanner reporting Medium Vulnerability on SSL Certs</title>
        <link>https://community.watchguard.com/watchguard-community/discussion/3250/nessus-scanner-reporting-medium-vulnerability-on-ssl-certs</link>
        <pubDate>Wed, 10 May 2023 12:45:56 +0000</pubDate>
        <category>Firebox - Certificates</category>
        <dc:creator>GrahamElder</dc:creator>
        <guid isPermaLink="false">3250@/watchguard-community/discussions</guid>
        <description><![CDATA[<p>Hi,</p>

<p>We have M370 firebox and have recently moved from SSLVPN to IKEv2.  However, we have one home user who we just can't get working on IKEv2 and have thus needed to leave SSLVPN active for this one user.</p>

<p>Our parent organisation run weekly Nessus Scans and these report:</p>

<p>Medium Vulnerability Name : "SSL Self-Signed Certificate" and  "SSL Certificate Cannot Be Trusted"</p>

<p>What steps do I need to take to prevent these vulnerabilities being picked up by the Nessus scan while we continue to provide SSLVPN access to this one user?</p>

<p>Many thanks,<br />
Graham</p>
]]>
        </description>
    </item>
    <item>
        <title>Certificates for DPI</title>
        <link>https://community.watchguard.com/watchguard-community/discussion/3192/certificates-for-dpi</link>
        <pubDate>Thu, 30 Mar 2023 12:20:04 +0000</pubDate>
        <category>Firebox - Certificates</category>
        <dc:creator>SunsetFett</dc:creator>
        <guid isPermaLink="false">3192@/watchguard-community/discussions</guid>
        <description><![CDATA[<p>We are looking to enable DPI on all of our firewalls. I have about 15 firewalls in total. I also have a local Enterporise CA which i am going to use for the certs.  When it comes to creating the certificates for the dpi for outbound traffic do I have to create a certificate for each firewall or can I create one certificate and import that into all of my firewalls.  Id much rather manage one cert than 15 individual ones if possible.</p>
]]>
        </description>
    </item>
    <item>
        <title>FNMT digital certificate signature</title>
        <link>https://community.watchguard.com/watchguard-community/discussion/3125/fnmt-digital-certificate-signature</link>
        <pubDate>Mon, 27 Feb 2023 13:46:59 +0000</pubDate>
        <category>Firebox - Certificates</category>
        <dc:creator>Juanmax</dc:creator>
        <guid isPermaLink="false">3125@/watchguard-community/discussions</guid>
        <description><![CDATA[<p>Hi,</p>

<p>I want to be able to sign digitally through the browser with a certificate from the FNMT, but when I change the action to inspect in the domain name rules, the certificate does not work.<br />
It is as if the personal certificate was not installed on the computer.</p>

<p>This is the test website:<br /><a href="https://www.sede.fnmt.gob.es/certificados/persona-fisica/verificar-estado/solicitar-verificacion" rel="nofollow">https://www.sede.fnmt.gob.es/certificados/persona-fisica/verificar-estado/solicitar-verificacion</a></p>

<p>Adjunto imagen<br /><a href="https://us.v-cdn.net/6029905/uploads/editor/wt/i2xmr2kzjtls.png" rel="nofollow">https://us.v-cdn.net/6029905/uploads/editor/wt/i2xmr2kzjtls.png</a></p>
]]>
        </description>
    </item>
    <item>
        <title>How to all HSTS sites through the Firewall</title>
        <link>https://community.watchguard.com/watchguard-community/discussion/1285/how-to-all-hsts-sites-through-the-firewall</link>
        <pubDate>Thu, 24 Sep 2020 14:40:06 +0000</pubDate>
        <category>Firebox - Certificates</category>
        <dc:creator>ABS</dc:creator>
        <guid isPermaLink="false">1285@/watchguard-community/discussions</guid>
        <description><![CDATA[<p>HSTS sites are causing a problem when being accessed.  The WG gives an invalid certificate error in all browsers. The WG blocks them, even if a rule is put in place to allow the traffic.  Any ideas are appreciated.</p>
]]>
        </description>
    </item>
    <item>
        <title>Missing Trusted CA Certificates (mostly intermediates)</title>
        <link>https://community.watchguard.com/watchguard-community/discussion/2757/missing-trusted-ca-certificates-mostly-intermediates</link>
        <pubDate>Fri, 12 Aug 2022 09:56:24 +0000</pubDate>
        <category>Firebox - Certificates</category>
        <dc:creator>JXB</dc:creator>
        <guid isPermaLink="false">2757@/watchguard-community/discussions</guid>
        <description><![CDATA[<p>Hello everyone,</p>

<p>we have been using https deep packet inspection for years now.</p>

<p>Recently, we have been getting more and more feedback that websites cause certificate warnings, but only from the company network. The reason is always a missing intermediate certificate on the Watchguard's certificate store. If I add these manually, everything is ok again.<br />
Now I have updated to the latest firmware, but unfortunately the manually added certificates are lost!?<br />
Has anyone had similar experiences at the moment?</p>

<p>Thanks in advance,</p>

<p>Joerg</p>
]]>
        </description>
    </item>
    <item>
        <title>New certificates, but &quot;the name on the security certificate is invalid&quot;</title>
        <link>https://community.watchguard.com/watchguard-community/discussion/3034/new-certificates-but-the-name-on-the-security-certificate-is-invalid</link>
        <pubDate>Thu, 12 Jan 2023 21:25:01 +0000</pubDate>
        <category>Firebox - Certificates</category>
        <dc:creator>Paddleboat21</dc:creator>
        <guid isPermaLink="false">3034@/watchguard-community/discussions</guid>
        <description><![CDATA[<p>Hello!  Our vendor recently generated new certificates for my comapny's site, which sits behind a Firebox.  I used the internal portal to download the Fireware web CA certificate using <a rel="nofollow" href="https://www.watchguard.com/help/docs/help-center/en-US/Content/en-US/Fireware/certificates/certificate_portal_c.html">these instructions</a> and the I downloaded the Fireware HTTPS Proxy as well.  I deployed both to the Trusted Root CA on my computers using Group Policy, <a rel="nofollow" href="https://www.watchguard.com/help/docs/help-center/en-US/Content/en-US/Fireware/certificates/import_client_cert.html#Import6">as detailed here.</a>  That went fine, and I see the certificates in the computers certificates in my Windows 10 PCs.  However, Outlook users are still reporting that Security Alert windows pop up during the use of Outlook.  The warnings have "outlook.office365.com" or "autodiscover-s.microsoft.com" at the top and state that information exchanged is still encrypted, but that there is s problem with the certificate.  There are three sections below that, the top two with green checkmarks and the bottom with a red X.  The X is next to "the name on the security certificate is invalid or does not match the name of the site."  Has anyone seen this before and fixed it?  It looks like my vendor didn't generate the certificates right, but I don't know firewalls well enough to state that.</p>
]]>
        </description>
    </item>
    <item>
        <title>Use different certificates Internal/External on Firebox</title>
        <link>https://community.watchguard.com/watchguard-community/discussion/2986/use-different-certificates-internal-external-on-firebox</link>
        <pubDate>Fri, 09 Dec 2022 11:13:43 +0000</pubDate>
        <category>Firebox - Certificates</category>
        <dc:creator>peawet</dc:creator>
        <guid isPermaLink="false">2986@/watchguard-community/discussions</guid>
        <description><![CDATA[<p>We use a different domain name internally to externally.  Unfortunately the Firebox only allows you to select one certificate to use as the Webserver certificate.  So visiting the internal Authentication Portal uses the same certificate as the SSLVPN/Access Portal.</p>

<p>I set the certificate to the external domain (ext-domain.com) so my external users don't get certificate warnings. My internal users, when authenticating, connect to <a href="https://wg.int-domain.com:4100" rel="nofollow">https://wg.int-domain.com:4100</a> but get a certificate error because the domain doesn't match the external certificate.</p>

<p>I've raised this with WG and they created a bug/feature request for it but like other things I've reported it'll just sit there sending me reminder emails for the next millennia.</p>

<p>I also have a Pulse SSL VPN and I can configure different certificates on internal ports to External ports.  Would this be a useful feature for anyone else or does anybody know a way around it?</p>

<p>Thanks</p>
]]>
        </description>
    </item>
    <item>
        <title>Third Party Cert</title>
        <link>https://community.watchguard.com/watchguard-community/discussion/2709/third-party-cert</link>
        <pubDate>Tue, 19 Jul 2022 18:00:54 +0000</pubDate>
        <category>Firebox - Certificates</category>
        <dc:creator>DCAFS</dc:creator>
        <guid isPermaLink="false">2709@/watchguard-community/discussions</guid>
        <description><![CDATA[<p>I have added a new third party Cert but the firebox is still using the old one. Does the firebox need a restart for the new cert to work ?</p>

<p>Thanks</p>
]]>
        </description>
    </item>
    <item>
        <title>Eliptic Curve Certificate</title>
        <link>https://community.watchguard.com/watchguard-community/discussion/2673/eliptic-curve-certificate</link>
        <pubDate>Wed, 29 Jun 2022 11:21:58 +0000</pubDate>
        <category>Firebox - Certificates</category>
        <dc:creator>Inntravel</dc:creator>
        <guid isPermaLink="false">2673@/watchguard-community/discussions</guid>
        <description><![CDATA[<p>Hi<br />
I am trying to access a site that is using the ECC certificate. The firewall refused to allow me to connect to it.<br />
The site is  (<a href="https://www.philcrean.com/alpujarras)" rel="nofollow">https://www.philcrean.com/alpujarras)</a><br />
I am able to connect to it from a home PC that isnt attached to the Firewall.</p>

<p>I have previously logged a call when trying to add ECC certificates for our own Content Inspection, but have had to revert back to RSA due to issues connecting to websites.</p>

<p>is there a way that i can allow my users to browse to this address</p>

<p>thanks<br />
Tess</p>
]]>
        </description>
    </item>
    <item>
        <title>Is there a fix for err 20 &amp; 21?</title>
        <link>https://community.watchguard.com/watchguard-community/discussion/2641/is-there-a-fix-for-err-20-21</link>
        <pubDate>Sun, 12 Jun 2022 13:34:48 +0000</pubDate>
        <category>Firebox - Certificates</category>
        <dc:creator>ACO</dc:creator>
        <guid isPermaLink="false">2641@/watchguard-community/discussions</guid>
        <description><![CDATA[<p>Ever since attaching a Samsung so-called "smart" TV to the network via Wi-Fi, I have been seeing these errors. They don't seem to affect things but it is a bit annoying.</p>

<p>2022-06-12 09:16:26 pxy Peer certificate preverify failed (err 20 : unable to get local issuer certificate) for [/C=KR/ST=Kyong-gi/O=Samsung Electronics/OU=Samsung Hubsite/CN=<em>.samsungcloudsolution.net] (cert 0x1056f680, store 0x10a394b8)<br />
2022-06-12 09:16:26 pxy Peer certificate preverify failed (err 21 : unable to verify the first certificate) for [/C=KR/ST=Kyong-gi/O=Samsung Electronics/OU=Samsung Hubsite/CN=</em>.samsungcloudsolution.net] (cert 0x1056f680, store 0x10a394b8)</p>

<p>Q1: Is the use of the wildcard "*" even valid nomenclature</p>

<p>...and, more importantly...</p>

<p>Q2: Is there a way of fixing this so that the certificate look-up is resolved?</p>

<p>If the fix involves me downloading and installing a certificate (or three) to the Firebox, you'll have to give me the details like where to find the valid certificate(s). It has been centuries since I have had to do any of this type of network stuff.</p>
]]>
        </description>
    </item>
    <item>
        <title>Renew Third Party Cert</title>
        <link>https://community.watchguard.com/watchguard-community/discussion/2348/renew-third-party-cert</link>
        <pubDate>Tue, 25 Jan 2022 18:29:33 +0000</pubDate>
        <category>Firebox - Certificates</category>
        <dc:creator>shaazaminator</dc:creator>
        <guid isPermaLink="false">2348@/watchguard-community/discussions</guid>
        <description><![CDATA[<p>When trying to upload my new third party cert as a .pem file to replace the expiring cert on my firebox, I receive the error "the certificate already exists".<br />
Thinking it was a naming issue I imported the root cert in Windows, then exported it as a Base-64 encoded X.509 .cer file and renamed it.</p>

<p>Same error, file already exists when importing into the FB.</p>

<p>Do I need to delete the current third party cert before I can upload the new one?<br />
That doesn't seem right.<br />
I assumed I could import the new cert and go into Policy Manager &gt; Setup &gt; Certificates &gt; Web Server and choose the new cert from the drop down menu and make it the active FB web cert.</p>

<p>The CSR was originally generated from the FB so no worry about importing the certificate chain in the correct order.</p>

<p>I'm missing something.</p>

<p>Thanks,</p>

<ul><li>Doug</li>
</ul>]]>
        </description>
    </item>
   </channel>
</rss>
